Red Hat Customer Portal

Skip to main content

Main Navigation

  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Automation Platform
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat Advanced Cluster Management for Kubernetes
      • Red Hat Quay
      • Red Hat CodeReady Workspaces
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • Runtimes
      • Back
      • Red Hat Runtimes
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat Data Grid
      • Red Hat JBoss Web Server
      • Red Hat Single Sign On
      • Red Hat support for Spring Boot
      • Red Hat build of Node.js
      • Red Hat build of Thorntail
      • Red Hat build of Eclipse Vert.x
      • Red Hat build of OpenJDK
      • Red Hat build of Quarkus
      • Red Hat CodeReady Studio
    • Integration and Automation
      • Back
      • Red Hat Integration
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat 3scale API Management
      • Red Hat JBoss Data Virtualization
      • Red Hat Process Automation
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
    • Support
    • Production Support
    • Development Support
    • Product Life Cycles
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem Catalog
    • Partner Resources
    • Red Hat in the Public Cloud
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • 한국어
    • 日本語
    • 中文 (中国)
Red Hat Customer Portal
  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Automation Platform
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat Advanced Cluster Management for Kubernetes
      • Red Hat Quay
      • Red Hat CodeReady Workspaces
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • Runtimes
      • Back
      • Red Hat Runtimes
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat Data Grid
      • Red Hat JBoss Web Server
      • Red Hat Single Sign On
      • Red Hat support for Spring Boot
      • Red Hat build of Node.js
      • Red Hat build of Thorntail
      • Red Hat build of Eclipse Vert.x
      • Red Hat build of OpenJDK
      • Red Hat build of Quarkus
      • Red Hat CodeReady Studio
    • Integration and Automation
      • Back
      • Red Hat Integration
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat 3scale API Management
      • Red Hat JBoss Data Virtualization
      • Red Hat Process Automation
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
    • Support
    • Production Support
    • Development Support
    • Product Life Cycles
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem Catalog
    • Partner Resources
    • Red Hat in the Public Cloud
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • 한국어
    • 日本語
    • 中文 (中国)
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Search
  • Log In
  • Language
Or troubleshoot an issue.

Log in to Your Red Hat Account

Log In

Your Red Hat account gives you access to your profile, preferences, and services, depending on your status.

Register

If you are a new customer, register now for access to product evaluations and purchasing capabilities.

Need access to an account?

If your company has an existing Red Hat account, your organization administrator can grant you access.

If you have any questions, please contact customer service.

Red Hat Account Number:

Red Hat Account

  • Account Details
  • User Management
  • Account Maintenance
  • Account Team

Customer Portal

  • My Profile
  • Notifications
  • Help

For your security, if you’re on a public computer and have finished using your Red Hat services, please be sure to log out.

Log Out

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)
Red Hat Customer Portal Red Hat Customer Portal
  • Products & Services
  • Tools
  • Security
  • Community
  • Infrastructure and Management

  • Cloud Computing

  • Storage

  • Runtimes

  • Integration and Automation

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat CodeReady Workspaces
  • Red Hat OpenShift Service on AWS
  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat Openshift Container Storage
  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus
  • Red Hat CodeReady Studio
  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
View All Products
  • Support
  • Production Support
  • Development Support
  • Product Life Cycles

Services

  • Consulting
  • Technical Account Management
  • Training & Certifications
  • Documentation
  • Red Hat Enterprise Linux
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Ecosystem Catalog
  • Red Hat in the Public Cloud
  • Partner Resources

Tools

  • Solution Engine
  • Packages
  • Errata
  • Customer Portal Labs
  • Configuration
  • Deployment
  • Security
  • Troubleshooting

Red Hat Insights

Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

  • Learn more
  • Go to Insights

Red Hat Product Security Center

Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

Product Security Center

Security Updates

  • Security Advisories
  • Red Hat CVE Database
  • Security Labs

Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

  • View Responses

Resources

  • Overview
  • Security Blog
  • Security Measurement
  • Severity Ratings
  • Backporting Policies
  • Product Signing (GPG) Keys

Customer Portal Community

  • Discussions
  • Blogs
  • Private Groups
  • Community Activity

Customer Events

  • Red Hat Convergence
  • Red Hat Summit

Stories

  • Red Hat Subscription Value
  • You Asked. We Acted.
  • Open Source Communities
Show Table of Contents
Hide Table of Contents
  • English
  • Single-page HTML
  • PDF
  • ePub
  1. Administration Guide
  2. I. Administering and Maintaining the Red Hat Virtualization Environment
    1. 1. Global Configuration
      1. 1.1. Roles
        1. 1.1.1. Creating a New Role
        2. 1.1.2. Editing or Copying a Role
        3. 1.1.3. User Role and Authorization Examples
      2. 1.2. System Permissions
        1. 1.2.1. User Properties
        2. 1.2.2. User and Administrator Roles
        3. 1.2.3. User Roles Explained
        4. 1.2.4. Administrator Roles Explained
        5. 1.2.5. Assigning an Administrator or User Role to a Resource
        6. 1.2.6. Removing an Administrator or User Role from a Resource
        7. 1.2.7. Managing System Permissions for a Data Center
        8. 1.2.8. Data Center Administrator Roles Explained
        9. 1.2.9. Managing System Permissions for a Cluster
        10. 1.2.10. Cluster Administrator Roles Explained
        11. 1.2.11. Managing System Permissions for a Network
        12. 1.2.12. Network Administrator and User Roles Explained
        13. 1.2.13. Managing System Permissions for a Host
        14. 1.2.14. Host Administrator Roles Explained
        15. 1.2.15. Managing System Permissions for a Storage Domain
        16. 1.2.16. Storage Administrator Roles Explained
        17. 1.2.17. Managing System Permissions for a Virtual Machine Pool
        18. 1.2.18. Virtual Machine Pool Administrator Roles Explained
        19. 1.2.19. Managing System Permissions for a Virtual Disk
        20. 1.2.20. Virtual Disk User Roles Explained
        21. 1.2.21. Setting a Legacy SPICE Cipher
      3. 1.3. Scheduling Policies
        1. 1.3.1. Creating a Scheduling Policy
        2. 1.3.2. Explanation of Settings in the New Scheduling Policy and Edit Scheduling Policy Window
      4. 1.4. Instance Types
        1. 1.4.1. Creating Instance Types
        2. 1.4.2. Editing Instance Types
        3. 1.4.3. Removing Instance Types
      5. 1.5. MAC Address Pools
        1. 1.5.1. Creating MAC Address Pools
        2. 1.5.2. Editing MAC Address Pools
        3. 1.5.3. Editing MAC Address Pool Permissions
        4. 1.5.4. Removing MAC Address Pools
    2. 2. Dashboard
      1. 2.1. Prerequisites
      2. 2.2. Global Inventory
      3. 2.3. Global Utilization
        1. 2.3.1. Top Utilized Resources
      4. 2.4. Cluster Utilization
        1. 2.4.1. CPU
        2. 2.4.2. Memory
      5. 2.5. Storage Utilization
    3. 3. Searches
      1. 3.1. Performing Searches in Red Hat Virtualization
      2. 3.2. Search Syntax and Examples
      3. 3.3. Search Auto-Completion
      4. 3.4. Search Result Type Options
      5. 3.5. Search Criteria
      6. 3.6. Search: Multiple Criteria and Wildcards
      7. 3.7. Search: Determining Search Order
      8. 3.8. Searching for Data Centers
      9. 3.9. Searching for Clusters
      10. 3.10. Searching for Hosts
      11. 3.11. Searching for Networks
      12. 3.12. Searching for Storage
      13. 3.13. Searching for Disks
      14. 3.14. Searching for Volumes
      15. 3.15. Searching for Virtual Machines
      16. 3.16. Searching for Pools
      17. 3.17. Searching for Templates
      18. 3.18. Searching for Users
      19. 3.19. Searching for Events
    4. 4. Bookmarks
      1. 4.1. Saving a Query String as a Bookmark
      2. 4.2. Editing a Bookmark
      3. 4.3. Deleting a Bookmark
    5. 5. Tags
      1. 5.1. Using Tags to Customize Interactions with Red Hat Virtualization
      2. 5.2. Creating a Tag
      3. 5.3. Modifying a Tag
      4. 5.4. Deleting a Tag
      5. 5.5. Adding and Removing Tags to and from Objects
      6. 5.6. Searching for Objects Using Tags
      7. 5.7. Customizing Hosts with Tags
  3. II. Administering the Resources
    1. 6. Quality of Service
      1. 6.1. Storage Quality of Service
        1. 6.1.1. Creating a Storage Quality of Service Entry
        2. 6.1.2. Removing a Storage Quality of Service Entry
      2. 6.2. Virtual Machine Network Quality of Service
        1. 6.2.1. Creating a Virtual Machine Network Quality of Service Entry
        2. 6.2.2. Settings in the New Virtual Machine Network QoS and Edit Virtual Machine Network QoS Windows Explained
        3. 6.2.3. Removing a Virtual Machine Network Quality of Service Entry
      3. 6.3. Host Network Quality of Service
        1. 6.3.1. Creating a Host Network Quality of Service Entry
        2. 6.3.2. Settings in the New Host Network Quality of Service and Edit Host Network Quality of Service Windows Explained
        3. 6.3.3. Removing a Host Network Quality of Service Entry
      4. 6.4. CPU Quality of Service
        1. 6.4.1. Creating a CPU Quality of Service Entry
        2. 6.4.2. Removing a CPU Quality of Service Entry
    2. 7. Data Centers
      1. 7.1. Introduction to Data Centers
      2. 7.2. The Storage Pool Manager
      3. 7.3. SPM Priority
      4. 7.4. Data Center Tasks
        1. 7.4.1. Creating a New Data Center
        2. 7.4.2. Explanation of Settings in the New Data Center and Edit Data Center Windows
        3. 7.4.3. Re-Initializing a Data Center: Recovery Procedure
        4. 7.4.4. Removing a Data Center
        5. 7.4.5. Force Removing a Data Center
        6. 7.4.6. Changing the Data Center Storage Type
        7. 7.4.7. Changing the Data Center Compatibility Version
      5. 7.5. Data Centers and Storage Domains
        1. 7.5.1. Attaching an Existing Data Domain to a Data Center
        2. 7.5.2. Attaching an Existing ISO domain to a Data Center
        3. 7.5.3. Attaching an Existing Export Domain to a Data Center
        4. 7.5.4. Detaching a Storage Domain from a Data Center
    3. 8. Clusters
      1. 8.1. Introduction to Clusters
      2. 8.2. Cluster Tasks
        1. 8.2.1. Creating a New Cluster
        2. 8.2.2. General Cluster Settings Explained
        3. 8.2.3. Optimization Settings Explained
        4. 8.2.4. Migration Policy Settings Explained
        5. 8.2.5. Scheduling Policy Settings Explained
        6. 8.2.6. Cluster Console Settings Explained
        7. 8.2.7. Fencing Policy Settings Explained
        8. 8.2.8. Setting Load and Power Management Policies for Hosts in a Cluster
        9. 8.2.9. Updating the MoM Policy on Hosts in a Cluster
        10. 8.2.10. Creating a CPU Profile
        11. 8.2.11. Removing a CPU Profile
        12. 8.2.12. Importing an Existing Red Hat Gluster Storage Cluster
        13. 8.2.13. Explanation of Settings in the Add Hosts Window
        14. 8.2.14. Removing a Cluster
        15. 8.2.15. Memory Optimization
        16. 8.2.16. Changing the Cluster Compatibility Version
    4. 9. Logical Networks
      1. 9.1. Logical Network Tasks
        1. 9.1.1. Performing Networking Tasks
        2. 9.1.2. Creating a New Logical Network in a Data Center or Cluster
        3. 9.1.3. Editing a Logical Network
        4. 9.1.4. Removing a Logical Network
        5. 9.1.5. Configuring a Non-Management Logical Network as the Default Route
        6. 9.1.6. Viewing or Editing the Gateway for a Logical Network
        7. 9.1.7. Logical Network General Settings Explained
        8. 9.1.8. Logical Network Cluster Settings Explained
        9. 9.1.9. Logical Network vNIC Profiles Settings Explained
        10. 9.1.10. Designate a Specific Traffic Type for a Logical Network with the Manage Networks Window
        11. 9.1.11. Explanation of Settings in the Manage Networks Window
        12. 9.1.12. Editing the Virtual Function Configuration on a NIC
      2. 9.2. Virtual Network Interface Cards
        1. 9.2.1. vNIC Profile Overview
        2. 9.2.2. Creating or Editing a vNIC Profile
        3. 9.2.3. Explanation of Settings in the VM Interface Profile Window
        4. 9.2.4. Enabling Passthrough on a vNIC Profile
        5. 9.2.5. Removing a vNIC Profile
        6. 9.2.6. Assigning Security Groups to vNIC Profiles
        7. 9.2.7. User Permissions for vNIC Profiles
        8. 9.2.8. Configuring vNIC Profiles for UCS Integration
      3. 9.3. External Provider Networks
        1. 9.3.1. Importing Networks From External Providers
        2. 9.3.2. Limitations to Using External Provider Networks
        3. 9.3.3. Configuring Subnets on External Provider Logical Networks
        4. 9.3.4. Adding Subnets to External Provider Logical Networks
        5. 9.3.5. Removing Subnets from External Provider Logical Networks
        6. 9.3.6. Assigning Security Groups to Logical Networks and Ports
      4. 9.4. Hosts and Networking
        1. 9.4.1. Refreshing Host Capabilities
        2. 9.4.2. Editing Host Network Interfaces and Assigning Logical Networks to Hosts
        3. 9.4.3. Synchronizing Host Networks
        4. 9.4.4. Editing a Host’s VLAN Settings
        5. 9.4.5. Adding Multiple VLANs to a Single Network Interface Using Logical Networks
        6. 9.4.6. Assigning Additional IPv4 Addresses to a Host Network
        7. 9.4.7. Adding Network Labels to Host Network Interfaces
        8. 9.4.8. Changing the FQDN of a Host
        9. 9.4.9. IPv6 Networking Support
        10. 9.4.10. Setting Up and Configuring SR-IOV
      5. 9.5. Network Bonding
        1. 9.5.1. Creating a Bond Device in the Administration Portal
        2. 9.5.2. Creating a Bond Device with the LLDP Labeler Service
        3. 9.5.3. Bonding Modes
      6. 9.6. Analyzing and Monitoring Network Connectivity
        1. 9.6.1. Introducing Skydive
        2. 9.6.2. Installing Skydive
        3. 9.6.3. Using Skydive to Test Network Connection
    5. 10. Hosts
      1. 10.1. Introduction to Hosts
      2. 10.2. Red Hat Virtualization Host
      3. 10.3. Red Hat Enterprise Linux hosts
      4. 10.4. Satellite Host Provider Hosts
      5. 10.5. Host Tasks
        1. 10.5.1. Adding Standard Hosts to the Red Hat Virtualization Manager
        2. 10.5.2. Adding a Satellite Host Provider Host
        3. 10.5.3. Configuring Satellite Errata Management for a Host
        4. 10.5.4. Explanation of Settings and Controls in the New Host and Edit Host Windows
        5. 10.5.5. Host General Settings Explained
        6. 10.5.6. Host Power Management Settings Explained
        7. 10.5.7. SPM Priority Settings Explained
        8. 10.5.8. Host Console Settings Explained
        9. 10.5.9. Network Provider Settings Explained
        10. 10.5.10. Kernel Settings Explained
        11. 10.5.11. Hosted Engine Settings Explained
        12. 10.5.12. Configuring Host Power Management Settings
        13. 10.5.13. Configuring Host Storage Pool Manager Settings
        14. 10.5.14. Configuring a Host for PCI Passthrough
        15. 10.5.15. Moving a Host to Maintenance Mode
        16. 10.5.16. Activating a Host from Maintenance Mode
        17. 10.5.17. Configuring Host Firewall Rules
        18. 10.5.18. Removing a Host
        19. 10.5.19. Updating Hosts Between Minor Releases
        20. 10.5.20. Reinstalling Hosts
        21. 10.5.21. Viewing Host Errata
        22. 10.5.22. Viewing the Health Status of a Host
        23. 10.5.23. Viewing Host Devices
        24. 10.5.24. Accessing Cockpit from the Administration Portal
        25. 10.5.25. Setting a Legacy SPICE Cipher
      6. 10.6. Host Resilience
        1. 10.6.1. Host High Availability
        2. 10.6.2. Power Management by Proxy in Red Hat Virtualization
        3. 10.6.3. Setting Fencing Parameters on a Host
        4. 10.6.4. fence_kdump Advanced Configuration
        5. 10.6.5. Soft-Fencing Hosts
        6. 10.6.6. Using Host Power Management Functions
        7. 10.6.7. Manually Fencing or Isolating a Non-Responsive Host
    6. 11. Storage
      1. 11.1. Understanding Storage Domains
      2. 11.2. Preparing and Adding NFS Storage
        1. 11.2.1. Preparing NFS Storage
        2. 11.2.2. Adding NFS Storage
        3. 11.2.3. Increasing NFS Storage
      3. 11.3. Preparing and Adding Local Storage
        1. 11.3.1. Preparing Local Storage
        2. 11.3.2. Adding Local Storage
      4. 11.4. Preparing and Adding POSIX-compliant File System Storage
        1. 11.4.1. Preparing POSIX-compliant File System Storage
        2. 11.4.2. Adding POSIX-compliant File System Storage
      5. 11.5. Preparing and Adding Block Storage
        1. 11.5.1. Preparing iSCSI Storage
        2. 11.5.2. Adding iSCSI Storage
        3. 11.5.3. Configuring iSCSI Multipathing
        4. 11.5.4. Migrating a Logical Network to an iSCSI Bond
        5. 11.5.5. Preparing FCP Storage
        6. 11.5.6. Adding FCP Storage
        7. 11.5.7. Increasing iSCSI or FCP Storage
        8. 11.5.8. Reusing LUNs
      6. 11.6. Preparing and Adding Red Hat Gluster Storage
        1. 11.6.1. Preparing Red Hat Gluster Storage
        2. 11.6.2. Adding Red Hat Gluster Storage
      7. 11.7. Importing Existing Storage Domains
        1. 11.7.1. Overview of Importing Existing Storage Domains
        2. 11.7.2. Importing storage domains
        3. 11.7.3. Migrating Storage Domains between Data Centers in the Same Environment
        4. 11.7.4. Migrating Storage Domains between Data Centers in Different Environments
        5. 11.7.5. Importing Virtual Machines from Imported Data Storage Domains
        6. 11.7.6. Importing Templates from Imported Data Storage Domains
      8. 11.8. Storage Tasks
        1. 11.8.1. Uploading Images to a Data Storage Domain
        2. 11.8.2. Moving Storage Domains to Maintenance Mode
        3. 11.8.3. Editing Storage Domains
        4. 11.8.4. Updating OVFs
        5. 11.8.5. Activating Storage Domains from Maintenance Mode
        6. 11.8.6. Detaching a Storage Domain from a Data Center
        7. 11.8.7. Attaching a Storage Domain to a Data Center
        8. 11.8.8. Removing a Storage Domain
        9. 11.8.9. Destroying a Storage Domain
        10. 11.8.10. Creating a Disk Profile
        11. 11.8.11. Removing a Disk Profile
        12. 11.8.12. Viewing the Health Status of a Storage Domain
        13. 11.8.13. Setting Discard After Delete for a Storage Domain
        14. 11.8.14. Enabling 4K support on environments with more than 250 hosts
        15. 11.8.15. Disabling 4K support
    7. 12. Pools
      1. 12.1. Introduction to Virtual Machine Pools
      2. 12.2. Creating a Virtual Machine Pool
      3. 12.3. Explanation of Settings and Controls in the New Pool and Edit Pool Windows
        1. 12.3.1. New Pool and Edit Pool General Settings Explained
        2. 12.3.2. New Pool and Edit Pool Type Settings Explained
        3. 12.3.3. New Pool and Edit Pool Console Settings Explained
        4. 12.3.4. Virtual Machine Pool Host Settings Explained
        5. 12.3.5. New Pool and Edit Pool Resource Allocation Settings Explained
      4. 12.4. Editing a Virtual Machine Pool
      5. 12.5. Prestarting Virtual Machines in a Pool
      6. 12.6. Adding Virtual Machines to a Virtual Machine Pool
      7. 12.7. Detaching Virtual Machines from a Virtual Machine Pool
      8. 12.8. Removing a Virtual Machine Pool
      9. 12.9. Trusted Compute Pools
        1. 12.9.1. Connecting an OpenAttestation Server to the Manager
        2. 12.9.2. Creating a Trusted Cluster
        3. 12.9.3. Adding a Trusted Host
    8. 13. Virtual Disks
      1. 13.1. Understanding Virtual Machine Storage
      2. 13.2. Understanding Virtual Disks
      3. 13.3. Settings to Wipe Virtual Disks After Deletion
      4. 13.4. Shareable Disks in Red Hat Virtualization
      5. 13.5. Read Only Disks in Red Hat Virtualization
      6. 13.6. Virtual Disk Tasks
        1. 13.6.1. Creating a Virtual Disk
        2. 13.6.2. Explanation of Settings in the New Virtual Disk Window
        3. 13.6.3. Overview of Live Storage Migration
        4. 13.6.4. Moving a Virtual Disk
        5. 13.6.5. Changing the Disk Interface Type
        6. 13.6.6. Copying a Virtual Disk
        7. 13.6.7. Uploading Images to a Data Storage Domain
        8. 13.6.8. Importing a Disk Image from an Imported Storage Domain
        9. 13.6.9. Importing an Unregistered Disk Image from an Imported Storage Domain
        10. 13.6.10. Importing a Virtual Disk from an OpenStack Image Service
        11. 13.6.11. Exporting a Virtual Disk to an OpenStack Image Service
        12. 13.6.12. Reclaiming Virtual Disk Space
    9. 14. External Providers
      1. 14.1. Introduction to External Providers in Red Hat Virtualization
      2. 14.2. Adding External Providers
        1. 14.2.1. Adding a Red Hat Satellite Instance for Host Provisioning
        2. 14.2.2. Adding an OpenStack Image (Glance) Instance for Image Management
        3. 14.2.3. Adding an OpenStack Networking (Neutron) Instance for Network Provisioning
        4. 14.2.4. Adding an OpenStack Block Storage (Cinder) Instance for Storage Management
        5. 14.2.5. Adding a VMware Instance as a Virtual Machine Provider
        6. 14.2.6. Adding a RHEL 5 Xen Host as a Virtual Machine Provider
        7. 14.2.7. Adding a KVM Host as a Virtual Machine Provider
        8. 14.2.8. Adding Open Virtual Network (OVN) as an External Network Provider
        9. 14.2.9. Adding an External Network Provider
        10. 14.2.10. Add Provider General Settings Explained
        11. 14.2.11. Add Provider Agent Configuration Settings Explained
      3. 14.3. Editing an External Provider
      4. 14.4. Removing an External Provider
  4. III. Administering the Environment
    1. 15. Administering the Self-Hosted Engine
      1. 15.1. Maintaining the Self-Hosted Engine
      2. 15.2. Administering the Manager Virtual Machine
        1. 15.2.1. Updating the Self-Hosted Engine Configuration
        2. 15.2.2. Configuring Email Notifications
      3. 15.3. Configuring Memory Slots Reserved for the Self-Hosted Engine on Additional Hosts
      4. 15.4. Adding Self-Hosted Engine Nodes to the Red Hat Virtualization Manager
      5. 15.5. Reinstalling an Existing Host as a Self-Hosted Engine Node
      6. 15.6. Booting the Manager Virtual Machine in Rescue Mode
      7. 15.7. Removing a Host from a Self-Hosted Engine Environment
      8. 15.8. Updating a Self-Hosted Engine
      9. 15.9. Changing the FQDN of the Manager in a Self-Hosted Engine
    2. 16. Backups and Migration
      1. 16.1. Backing Up and Restoring the Red Hat Virtualization Manager
        1. 16.1.1. Backing up Red Hat Virtualization Manager - Overview
        2. 16.1.2. Syntax for the engine-backup Command
        3. 16.1.3. Creating a Backup with the engine-backup Command
        4. 16.1.4. Restoring a Backup with the engine-backup Command
        5. 16.1.5. Restoring a Backup to a Fresh Installation
        6. 16.1.6. Restoring a Backup to Overwrite an Existing Installation
        7. 16.1.7. Restoring a Backup with Different Credentials
        8. 16.1.8. Backing up and Restoring a Self-Hosted Engine
        9. 16.1.9. Recovering a Self-Hosted Engine from an Existing Backup
        10. 16.1.10. Overwriting a Self-Hosted Engine from an Existing Backup
      2. 16.2. Migrating Red Hat Virtualization Databases to Remote Servers
        1. 16.2.1. Migrating the Manager Database to a Remote Server
        2. 16.2.2. Migrating the Self-Hosted Engine Database to a Remote Server
        3. 16.2.3. Migrating Data Warehouse to a Separate Machine
      3. 16.3. Backing Up and Restoring Virtual Machines Using a Backup Storage Domain
        1. 16.3.1. Backup storage domains explained
        2. 16.3.2. Setting a data storage domain to be a backup domain
        3. 16.3.3. Backing up or Restoring a Virtual Machine or Snapshot Using a Backup Domain
      4. 16.4. Backing Up and Restoring Virtual Machines Using the Backup and Restore API
        1. 16.4.1. The Backup and Restore API
        2. 16.4.2. Backing Up a Virtual Machine
        3. 16.4.3. Restoring a Virtual Machine
    3. 17. Errata Management with Red Hat Satellite
    4. 18. Automating Configuration Tasks using Ansible
      1. 18.1. Ansible Roles
        1. 18.1.1. Installing Ansible Roles
        2. 18.1.2. Using Ansible Roles to Configure Red Hat Virtualization
    5. 19. Users and Roles
      1. 19.1. Introduction to Users
      2. 19.2. Introduction to Directory Servers
      3. 19.3. Configuring an External LDAP Provider
        1. 19.3.1. Configuring an External LDAP Provider (Interactive Setup)
        2. 19.3.2. Attaching an Active Directory
        3. 19.3.3. Configuring an External LDAP Provider (Manual Method)
        4. 19.3.4. Removing an External LDAP Provider
      4. 19.4. Configuring LDAP and Kerberos for Single Sign-on
      5. 19.5. Installing and Configuring Red Hat Single Sign-On
        1. 19.5.1. Installing Red Hat Single Sign-On
        2. 19.5.2. Configuring the LDAP group mapper
        3. 19.5.3. Configuring Apache in the Manager
        4. 19.5.4. Configuring OVN
      6. 19.6. User Authorization
        1. 19.6.1. User Authorization Model
        2. 19.6.2. User Actions
      7. 19.7. Administering User Tasks From the Administration Portal
        1. 19.7.1. Adding Users and Assigning VM Portal Permissions
        2. 19.7.2. Viewing User Information
        3. 19.7.3. Viewing User Permissions on Resources
        4. 19.7.4. Removing Users
        5. 19.7.5. Viewing Logged-In Users
        6. 19.7.6. Terminating a User Session
      8. 19.8. Administering User Tasks From the Command Line
        1. 19.8.1. Creating a New User
        2. 19.8.2. Setting a User Password
        3. 19.8.3. Setting User Timeout
        4. 19.8.4. Pre-encrypting a User Password
        5. 19.8.5. Viewing User Information
        6. 19.8.6. Editing User Information
        7. 19.8.7. Removing a User
        8. 19.8.8. Disabling the Internal Administrative User
        9. 19.8.9. Managing Groups
        10. 19.8.10. Querying Users and Groups
        11. 19.8.11. Managing Account Settings
      9. 19.9. Configuring Additional Local Domains
    6. 20. Quotas and Service Level Agreement Policy
      1. 20.1. Introduction to Quota
      2. 20.2. Shared Quota and Individually Defined Quota
      3. 20.3. Quota Accounting
      4. 20.4. Enabling and Changing a Quota Mode in a Data Center
      5. 20.5. Creating a New Quota Policy
      6. 20.6. Explanation of Quota Threshold Settings
      7. 20.7. Assigning a Quota to an Object
      8. 20.8. Using Quota to Limit Resources by User
      9. 20.9. Editing Quotas
      10. 20.10. Removing Quotas
      11. 20.11. Service Level Agreement Policy Enforcement
    7. 21. Event Notifications
      1. 21.1. Configuring Event Notifications in the Administration Portal
      2. 21.2. Canceling Event Notifications in the Administration Portal
      3. 21.3. Parameters for Event Notifications in ovirt-engine-notifier.conf
      4. 21.4. Configuring the Red Hat Virtualization Manager to Send SNMP Traps
    8. 22. Utilities
      1. 22.1. The oVirt Engine Rename Tool
        1. 22.1.1. The oVirt Engine Rename Tool
        2. 22.1.2. Syntax for the oVirt Engine Rename Command
        3. 22.1.3. Renaming the Manager with the oVirt Engine Rename Tool
      2. 22.2. The Engine Configuration Tool
        1. 22.2.1. The Engine Configuration Tool
        2. 22.2.2. Syntax for the engine-config Command
      3. 22.3. The USB Filter Editor
        1. 22.3.1. Installing the USB Filter Editor
        2. 22.3.2. The USB Filter Editor Interface
        3. 22.3.3. Adding a USB Policy
        4. 22.3.4. Removing a USB Policy
        5. 22.3.5. Searching for USB Device Policies
        6. 22.3.6. Exporting a USB Policy
        7. 22.3.7. Importing a USB Policy
      4. 22.4. The Log Collector Tool
        1. 22.4.1. Log Collector
        2. 22.4.2. Syntax for the ovirt-log-collector Command
        3. 22.4.3. Basic Log Collector Usage
      5. 22.5. The ISO Uploader Tool
        1. 22.5.1. The ISO Uploader Tool
        2. 22.5.2. Syntax for the engine-iso-uploader Command
        3. 22.5.3. Specifying an NFS Server
        4. 22.5.4. Basic ISO Uploader Usage
        5. 22.5.5. Uploading the VirtIO and Guest Tool Image Files to an ISO Storage Domain
      6. 22.6. The Engine Vacuum Tool
        1. 22.6.1. The Engine Vacuum Tool
        2. 22.6.2. Engine Vacuum Modes
        3. 22.6.3. Syntax for the engine-vacuum Command
      7. 22.7. The VDSM to Network Name Mapping Tool
        1. 22.7.1. Mapping VDSM Names to Logical Network Names
  5. IV. Gathering Information About the Environment
    1. 23. Deploying Insights in Red Hat Virtualization Manager
    2. 24. Log Files
      1. 24.1. Manager Installation Log Files
      2. 24.2. Red Hat Virtualization Manager Log Files
      3. 24.3. SPICE Log Files
        1. 24.3.1. SPICE Logs for Hypervisor SPICE Servers
        2. 24.3.2. SPICE Logs for Guest Machines
        3. 24.3.3. SPICE Logs for SPICE Clients Launched Using console.vv Files
      4. 24.4. Host Log Files
      5. 24.5. Setting Up a Host Logging Server
      6. 24.6. Enabling the oVirt Engine Extension Logger log4j
    3. A. VDSM and Hooks
      1. A.1. VDSM
      2. A.2. VDSM Hooks
      3. A.3. Extending VDSM with Hooks
      4. A.4. Supported VDSM Events
      5. A.5. The VDSM Hook Environment
      6. A.6. The VDSM Hook Domain XML Object
      7. A.7. Defining Custom Properties
      8. A.8. Setting Virtual Machine Custom Properties
      9. A.9. Evaluating Virtual Machine Custom Properties in a VDSM Hook
      10. A.10. Using the VDSM Hooking Module
      11. A.11. VDSM Hook Execution
      12. A.12. VDSM Hook Return Codes
      13. A.13. VDSM Hook Examples
    4. B. Custom Network Properties
      1. B.1. Explanation of bridge_opts Parameters
      2. B.2. How to Set Up Red Hat Virtualization Manager to Use Ethtool
      3. B.3. How to Set Up Red Hat Virtualization Manager to Use FCoE
    5. C. Red Hat Virtualization User Interface Plugins
      1. C.1. Red Hat Virtualization User Interface Plug-ins
      2. C.2. Red Hat Virtualization User Interface Plugin Lifecycle
        1. C.2.1. Red Hat Virtualization User Interface Plug-in Life cycle
        2. C.2.2. Red Hat Virtualization User Interface Plug-in Discovery
        3. C.2.3. Red Hat Virtualization User Interface Plug-in Loading
        4. C.2.4. Red Hat Virtualization User Interface Plug-in Bootstrapping
      3. C.3. User Interface Plugin-related Files and Their Locations
      4. C.4. Example User Interface Plug-in Deployment
    6. D. Red Hat Virtualization and Encrypted Communication
      1. D.1. Replacing the Red Hat Virtualization Manager CA Certificate
      2. D.2. Setting Up Encrypted Communication between the Manager and an LDAP Server
      3. D.3. Manually Setting Up Encrypted Communication for VDSM
    7. E. Proxies
      1. E.1. SPICE Proxy
        1. E.1.1. SPICE Proxy Overview
        2. E.1.2. SPICE Proxy Machine Setup
        3. E.1.3. Turning On a SPICE Proxy
        4. E.1.4. Turning Off a SPICE Proxy
      2. E.2. Squid Proxy
        1. E.2.1. Installing and Configuring a Squid Proxy
      3. E.3. Websocket Proxy
        1. E.3.1. Websocket Proxy Overview
        2. E.3.2. Migrating the Websocket Proxy to a Separate Machine
    8. F. Branding
      1. F.1. Branding
        1. F.1.1. Re-Branding the Manager
        2. F.1.2. Login Screen
        3. F.1.3. Administration Portal Screen
        4. F.1.4. VM Portal Screen
        5. F.1.5. Pop-Up Windows
        6. F.1.6. Tabs
        7. F.1.7. The Welcome Page
        8. F.1.8. The Page Not Found Page
    9. G. System Accounts
      1. G.1. System Accounts
        1. G.1.1. Red Hat Virtualization Manager User Accounts
        2. G.1.2. Red Hat Virtualization Manager Groups
        3. G.1.3. Virtualization Host User Accounts
        4. G.1.4. Virtualization Host Groups

Part IV. Gathering Information About the Environment

  • 22.7.1. Mapping VDSM Names to Logical Network Names
  • 23. Deploying Insights in Red Hat Virtualization Manager
Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • openshift.com
  • developers.redhat.com
  • connect.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2021 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter Facebook

Formatting Tips

Here are the common uses of Markdown.

Code blocks
~~~
Code surrounded in tildes is easier to read
~~~
Links/URLs
[Red Hat Customer Portal](https://access.redhat.com)
Learn more